how to think like a 1950s UK cryptographer

2018-02-08 14_47_16-Microsoft Edge

Folks doing cryptography in the 1950s didn’t need to be mathmaticians. They simply needed to understand a particular set of algorithms (that happen to be derived from math theorems).

The https://www.safaribooksonline.com/oriole/probabilistic-programming-from-scratch-1-a-b-testing-with-approximate-bayesian-computation teaches you what a cryptanalyst learned in cryptographics 101, circa 1950. Little had changed since 1943.

If I said this a few years ago, Id be shot. Now its all laid out…

The teacher is good. He’s a total natural. When he says that the hardness of the problem is basically how wide is the distribution of guess, for the count fairs jar of coins, he is exactly right. now one gleans just why, back in 1944 colossus, one is driving the uncertainty out to the very extremes of the deviations … so that one has maximally learned from the simulated data, from guesses, how to minimize the variance from all the trials. That’s a fancy way of saying … the data now supports the conclusion!

In 1943, with ships sinking (at obvious cost) and time being of the essence, one needed means to decide which path to take (when attacking cryptograms). one sees how such entirely qualitative factors could be added to an otherwise quantitative search, to help direct the machine search.

The following address tunny (rather than enigma); but the general principle is the same!

2018-02-09 07_44_40-Microsoft Edge

Advertisements
Posted in coding theory

All computers are flawed — and the fix will take years – CNN Money

https://apple.news/AGaxpOdfDTIivnitQO7Y7dg

The nsa doublespeak

Posted in coding theory

Love it. Pure double speak

Posted in coding theory

Differential evolution overview

https://www.researchgate.net/profile/Todor_Balabanov2/publication/321714923_Slot_Machine_RTP_Optimization_and_Symbols_Wins_Equalization_with_Discrete_Differential_Evolution_Presentation/links/5a2d380ea6fdccfbbf897e13/Slot-Machine-RTP-Optimization-and-Symbols-Wins-Equalization-with-Discrete-Differential-Evolution-Presentation.pdf

Posted in coding theory

Yanqui lying on crypto

No “customer data” has been compromized (by leaky computing pipelines)

Thats because “targets” of spying are no longer @customers@

Its lying by definition

Posted in coding theory

Tunny, now known as dde!

Now one sees tunny rectangling as de

Posted in coding theory

Conditional branching in turings mind

Post war turing on cpu instruction set design knew how to leverage convolutionsl computation graphs – documented in the tunny report – to leverage conditional branching for cryptanalysis.

Even i was taught, in first year cd computer science computer architecture courses how the microcode behind each type of conditional branch instruction leverage amore basic computing model : handling the instruction pipeline itself.

What folks need to know is that the fixes indicate the wider problem: microcode download (for good or evil, or good again tomorrow when gchq releases its (well known) targeted spying patch

So what surprised me? That the precisely editions didn’t first require another zero day exploit, compromising the formal kernel security boundary

Gchq going for the user mode exploit is just brazen

Posted in coding theory

Protected: slot game programming notes–a demo

This content is password protected. To view it please enter your password below:

Posted in gaming

video/audio file inspection tool: gspot

image

see http://www.headbands.com/gspot/

Posted in coding theory

weird dream about concentration camp gassing (and George Washington)

ill write this down before I forget it: this morning’s dream.

In the dream I am explaining that there is little difference in spirit between George Washington’s plantation (a place you are worked to death, raped for breeding and generally oppressed by terroristic white overseers and their nazi bosses making money from race slavery) and Belsen. The essence is the same: mass murder (by forced labor). There is no out given to Washington (oh he was nice and freed his house slaves after his death).

A group of students then go on a field trip, in a giant  trailer that flys through the sky (in England). They fly over and in where the next group of reprobates are to be gassed, since society has returned to gassing folks. They are quite nonchalant about the whole experience, as they expect folks to be gassed (since its normal .. and they are not in the gassing class).

You know its a dream because as the trailer full of older students flys – like a 747 – two of the students are outside, like a couple of elves on santas sleigh. But in the dream its normal to be outside at 30k feet!

Well its normal until, as the “plane” is flying  over its route and banking at the Isle of White (where some military area is seen, according to the announcer), the sleigh riders start to zombify. They are being gassed (and it happens just before the rest of the class are gassed in the flying rv). Yes its an accident. The flying protocol was mistakenly set as a gassing class ride.

Im flying on the next ride, and as we get on we see body parts being handled as the ride is being prepared – evidence of the last gassing run. On the trip, I and others remark and how unfortunate it is that the wrong group get gassed – specially as they were all well heeled, private school students from wealthy families. But… here we are on the same trip – in a nazi society that has accepted such things as normal.

ok. so I know why these themes come up in the dream – given certain recent reality events that are still present in recently-augmented memory. But its still fascinating to see how the brain concocts a mis-reality  given the limited ability of memory and cognition to cooperate as the chemistry of the brain areas each return from sleep state.

Posted in coding theory

Crypto in short…

when we put random dots on a unit sphere and measure the distance from the origin (0,0,0), we find that the distance is always 1. But if we were to project that onto a 2D space, the distance would be less than or equal to 1. This same truth holds when we expand the dimensions. For instance, if we expanded our set from 3 dimensions to 4, it would be greater than or equal to 1. This inability to center in on a consistent distance is what breaks distance-based models, because all of the data points become chaotic and move away from one another.

Not me!

Posted in coding theory

trial open live writer

image

Image | Posted on by

How to Make a VR Game With Unity and Google Cardboard

https://www.raywenderlich.com/116805/make-vr-game-unity-google-cardboard

Posted in coding theory

fixing vr app

youll be lucky, speaking in sept 2017, to https://hackernoon.com/how-to-make-a-vr-app-with-zero-experience-927438e2dede

I fixed the FIRST BIT OF bit rot by replacing no-longer available cardboard sdk imports with an import of the relevant assets from the (older) cardboard unity project… also mentioned in the article. I say “import” – but in reality I used windows explorer to drag/drop the cardboard folder from its source to the assets directory of the unity project.

Capture

with that you can at least wander around the scene in the PC unity’s play mode.

Posted in coding theory

Classifying a web page about fridge

Posted in coding theory
Posted in coding theory

odt linking trial

blog

which is terrible

Posted in coding theory

How to Make a VR Game With Unity and Google Cardboard

Posted in coding theory

Ubuntu Forums

Posted in coding theory

Routine non-criminal immigration enforcement operations will not be conducted at evacuation sites, or assistance centers such as shelters or food banks,” it said.

Which means everything else ice does is handled at those relief sites…

And that is every deportee (who returned).

so the rumor is true. Ice will use this as a funnel (for the felon-to-be class). And that’s a lot of folk.

At a policy level I cannot disagree. At a practice level, ice have to do better in leveling. The storm shelter program and red cross Assistance is just another tool (to keep roundup costs low and ice staff safety high).

Posted in coding theory

Could Trump pardon Joe Arpaio by tweet? – BBC News

Ok Michael Baum

What did you do !!

Posted in coding theory

Uc unity


See http://catlikecoding.com/unity/tutorials/procedural-grid/

Posted in coding theory

Evidence of Washoe school district trumpist staff racism

Spanish springs.

Just sad. As in trump sad. But very very American. 

Posted in coding theory

slides-of-loci/README.md at master · agostontorok/slides-of-loci · GitHub

Posted in coding theory

Course materials

http://www-bcf.usc.edu/~tbrun/Course

Posted in coding theory

Candy Crush’s Acquisition And What It Means For Mobile Gaming Companies — Mahesh VC

Posted in coding theory
Posted in coding theory

What is a Pre-money valuation and Post-money valuation?

http://startuplawyer.com/venture-capital/pre-money-and-post-money-valuation

Posted in coding theory

Trump says he has no ‘tapes’ of Comey conversations – The Washington Post

Which makes no statement about whether someone else does.

It’s like me sayin there are no tapes of my phone and I made none knowing full well NSA tapes everything on my phone and died the taping).

But “i” don’t do it

Classic American disinformation

Posted in coding theory

turings quaterion group wired rotor and Cliff of grade=2

document

2017-06-22 10_03_28-The-quaternion-group-and-modern-physics-Girard.pdf and 9 more pages ‎- Microsoft

Posted in coding theory